Avaya DXX-1015-01 manual Acknowledgment

Page 2

2002, Avaya Inc. All Rights Reserved

Notice

Every effort was made to ensure that the information in this book was complete and accurate at the time of printing. However, information is subject to change.

Preventing Toll Fraud

“Toll fraud” is the unauthorized use of your telecommunications system by an unauthorized party (for example, a person who is not a corporate employee, agent, subcontractor, or working on your company's behalf). Be aware that there may be a risk of toll fraud associated with your system and that, if toll fraud occurs, it can result in substantial additional charges for your telecommu- nications services.

Avaya Fraud Intervention

If you suspect that you are being victimized by toll fraud and you need technical support or assistance, call Technical Service Center Toll Fraud Intervention Hotline at +1 800 643 2353.

Providing Telecommunications Security

Telecommunications security (of voice, data, and/or video communications) is the prevention of any type of intrusion to (that is, either unauthorized or mali- cious access to or use of your company's telecommunications equipment) by some party.

Your company's “telecommunications equipment” includes both this Avaya product and any other voice/data/video equipment that could be accessed via this Avaya product (that is, “networked equipment”).

An “outside party” is anyone who is not a corporate employee, agent, subcon- tractor, or working on your company's behalf. Whereas, a “malicious party” is anyone (including someone who may be otherwise authorized) who accesses your telecommunications equipment with either malicious or mischievous intent.

Such intrusions may be either to/through synchronous (time-multiplexed and/or circuit-based) or asynchronous (character-, message-, or packet-based) equip- ment or interfaces for reasons of:

Utilization (of capabilities special to the accessed equipment)

Theft (such as, of intellectual property, financial assets, or toll-facility access)

Eavesdropping (privacy invasions to humans)

Mischief (troubling, but apparently innocuous, tampering)

Harm (such as harmful tampering, data loss or alteration, regardless of motive or intent)

Be aware that there may be a risk of unauthorized intrusions associated with your system and/or its networked equipment. Also realize that, if such an intru- sion should occur, it could result in a variety of losses to your company (includ- ing but not limited to, human/data privacy, intellectual property, material assets, financial resources, labor costs, and/or legal costs).

Your Responsibility for Your Company's Telecommunications Security

The final responsibility for securing both this system and its networked equip- ment rests with you - an Avaya customer's system administrator, your telecom- munications peers, and your managers. Base the fulfillment of your responsibility on acquired knowledge and resources from a variety of sources including but not limited to:

Installation documents

System administration documents

Security documents

Hardware-/software-based security tools

Shared information between you and your peers

Telecommunications security experts

To prevent intrusions to your telecommunications equipment, you and your peers should carefully program and configure your:

Avaya-provided telecommunications systems and their interfaces

Avaya-provided software applications, as well as their underlying hardware/software platforms and interfaces

Any other equipment networked to your Avaya products.

Avaya National Customer Care Center

Avaya provides a telephone number for you to use to report problems or to ask questions about your contact center. The support telephone number

is 1-800-242-2121.

Ordering Information

Avaya Publications Center

Voice: +1 800 457 1235

International Voice: 410 568 3680

Fax: +1 800 457 1764

International Fax: 410 891 0207

Email: totalware@gwsmail.com

Write: GlobalWare Solutions

Attention: Avaya Account Manager

200 Ward Hill Avenue

Haverhill, MA 01835 USA

Order: Document No. DXX-1015-01, Issue 1.0, June 2002

To order product documentation online, go to

http://www.avayadocs.com, click on Online Services, and select the appropri- ate product group.

Warranty

Avaya Inc. provides a limited warranty on this product. Refer to the “Limited Use Software License Agreement” or other applicable documentation provided with your package to establish the terms of the limited warranty.

Avaya Web Page

http://www.avaya.com

Trademarks

Avaya, Conversant, CustomerQ, Definity, DefinityOne, Nabnasset, Quintus, and WebQ are registered trademarks or trademarks of Avaya Inc. in the United States or other countries or both.

Portions of Avaya Interaction Center include technology used under license as listed below, and are copyright of the respective companies and/or their licen- sors:

ActivePerl is a trademark of ActiveState Tool Corp. This product includes software developed by the Apache Software Foundation (http://www.apache.org/). Cognos, Impromptu and Powerplay are registered trademarks of Cognos Incorporated. YACC++ is a registered trademark of Compiler Resources, Inc. APEX, ComponentOne, VideoSoft, True DBGrid, VSVIEW, SizerOne, VS-OCX, VSFlexGrid, VSFORUM, VSREPORTS, VSDOCX, VSSPELL, and TrueDBList are either registered trademarks or trademarks of ComponentOne LLC. CT Connect, Dialogic, Intel, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Hummingbird is a registered trademark of Hummingbird, Ltd. SearchServer is a trademark of Hummingbird, Ltd. RISC System/6000 and DirectTalk/2 are trademarks of International Business Machines Corporation in the United States or other countries or both. IBM, OS/2, AS/400, CICS, WebSphere, CT, VisualAge, and DirectTalk are registered trademarks of International Business Machines Corporation in the United States or other countries or both. Lotus and Lotus Sametime are trademarks or registered trademarks of Lotus Development Corporation and/or IBM Corporation in the United States, other countries, or both. VisualX is a registered trademark of Intergroup Technologies, Inc. ActiveX, Visio, Internet Explorer, Windows, Windows NT, Windows 2000, Win32s, SQL Server, Visual Basic, Visual C++, Outlook, and FrontPage are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. TimesTen is a registered trademark of TimesTen Performance Software. Oracle is a registered trademark, and Oracle8i and

Oracle® SQL/Services are trademarks or registered trademarks of Oracle Corporation. Rogue Wave and .h++ are registered trademarks of Rogue Wave Software Inc. SourcePro is a trademark of Rogue Wave Software, Inc. Siebel is a trademark of Siebel Systems, Inc. BasicScript is a registered trademark of Summit Software Company. Sun, iPlanet, Java, Solaris JRE, J2EE, JavaServer Pages, and all Java-based trademarks are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. SPARC is a registered trademark of SPARC International, Inc. Products bearing SPARC trademarks are based on an architecture devel- oped by Sun Microsystems, Inc. In3D is a trademark of Visual Insights, Inc. InstallShield® is a registered trademark and service mark of InstallShield Software Corporation in the United States and/or other countries. ORBacus is a trademark of IONA Technologies PLC. Formula One is a licensed trademark and Tidestone Technologies, Inc. Visual Components, First Impression, and VisualSpeller are registered trademarks of Tidestone Technologies, Inc. JRun is a trademark of Macromedia, Inc. in the United States and/or other countries. Intervoice is a registered trademark of Intervoice-Brite, Inc. UNIX is a registered trademark of The Open Group in the United States and other countries. Acrobat is a registered trademark of Adobe Systems.

Other product and brand names are trademarks of their respective owners.

Acknowledgment

This document was written by the CRM Information Development group of Avaya

Image 2
Contents Avaya Interaction Center Acknowledgment Contents Contents Agent Data Unit Server Programmer’s GuideContacting Technical Support Before YOU BeginTypographical Conventions Font Type MeaningElectronic Documentation Product DocumentationReadme File Issue 1.0 June 2002 Educational ServicesEducational Services Printed DocumentationAgent Data Unit Server Programmer’s Guide Overview Start-up ProceduresChapter ADU Server Cooperation of ADU Servers ADU ServerADU Lifecycle Chapter Agent Data UnitDefinition of an ADU ADU CreationAgent Data Unit Listing Active ADUsADU Termination ADU Data Table Bytes Example Description ContentsAduid AduidADU Contents Field Name Description Set By ADU ContentsCore ADU Fields Sheet 1 Agent ADU FieldsDescription Set By Sheet 2 Sheet 3 Value Explanation Voice Data ContainersSheet 4 Queue ADU Fields Following ADU fields are used by queues on Avaya ICContainers ContainersContainer Names and Special Tokens Containername .!loginid Limitations of Container SyntaxADU.Update VDU.Update Container ConfigurationsParameter Type Default Description ADU.Create VDU.CreateEDU Values written if tscon is set to true Agent Data Unit Description Message Chapter Event MonitoringADU Event Monitoring Starting and Stopping Event Monitoring Event MonitoringMonitoring Criteria Syntax Setting Event Monitoring CriteriaSetting Event Monitoring Criteria Example ADU.Assign loginid=Joe & ts.1.s=wrapup Symbol Definition Description Relational OperatorsWildcard Definition Example Boolean OperatorsMonitoring Criteria Wildcards Monitoring Criteria Examples Criteria Example DescriptionEvent Monitoring Agent Data Unit Server Programmer’s Guide Chapter Alarms Priority Description Cause/Recommended ActionAlarms System Considerations Chapter ADU Server ConfigurationConfiguration Parameters ADU Server Alias NameADU Server Configuration Configuration Parameters Sheet 4 Set them on the Config tab of the ADU Server Editor dialog Name DescriptionADU Server Configuration Chapter IDL Specification IDL Specification Exception Information Chapter ADU Server MethodsMethod Objectives ADU Server Methods Routing RequestsMethod Overview Method Overview ADU.Create MethodsADU.Assign ADU.Deassign ADU.DeassignADU.DeleteOneValue ADU.DeleteSubTree ADU.DeleteValuesADU.EventsIn ADU.EventsInADU.Find ADU.FindByKey Locate an ADU having a key containingADU.ForwardEvent ADU.FindOrCreateADU.ForceTerminate ADU.FindOrCreateADU.GetActive ADU.GetOneValueADU.GetSomeValues ADU.GetSomeValuesADU.GetSubTree ADU.GetValues ADU.GetValueHistoryADU.GetValuesHistory ADU.GetValuesHistoryFirst value that was set was truth ADU.IncrValue ADU.IncrValueADU.Monitor ADU.RemoteWatcher ADU.SetAndTerminateADU.SetAndTransfer ADU.SetDefaultHistoryFilterADU.SetAndTransfer ADU.SetHistoryFilter Hsnostart Hsnochange Hsnotransfer Hsnouser HsnodeleteADU.SetOneValue ADU.SetOneValueADU.SetValues ADU.SetValuesExtendedADU.Suspend ADU.SuspendADU.Terminate ADU.TerminateMine ADU.TouchADU.Transfer ADU.TransferADU Server Methods Agent Data Unit Server Programmer’s Guide Symbols IndexIndex AduidIssue 1.0 June 2002 Index Index Index Agent Data Unit Server Programmer’s Guide